ONLINE
THREATS: 4
0
0
1
0
0
0
1
1
0
1
1
0
1
1
0
1
1
0
0
0
1
1
0
1
1
0
1
0
0
1
1
1
1
0
0
1
1
1
0
1
1
1
0
1
1
0
1
0
1
0
ISO27001

ISO 27001 for Healthcare Organizations: Medical Data Protection

Loading advertisement...
84

The emergency room physician looked at me with exhausted eyes. It was 11 PM on a Saturday, and their hospital's electronic health record system had been down for six hours. Nurses were scrambling with paper charts. Lab results were being phoned in. Patients were being diverted to other facilities.

"We passed our HIPAA audit last year," she said, her frustration palpable. "How did this happen?"

That question changed the trajectory of my consulting work in healthcare. Over the next decade, I worked with 30+ healthcare organizations, and I discovered a crucial truth: HIPAA compliance is necessary, but it's not sufficient. The healthcare organizations that truly protected their patients—and themselves—were the ones that went beyond minimum requirements and embraced comprehensive frameworks like ISO 27001.

Let me show you why ISO 27001 has become the gold standard for healthcare data protection, and how it goes far beyond what HIPAA requires.

Why Healthcare Data Is the Crown Jewel for Cybercriminals

Here's a statistic that should terrify every healthcare executive: medical records sell for $250 on the dark web, compared to $5 for a stolen credit card number.

Why? Because medical records are a treasure trove:

  • Social Security numbers

  • Insurance information

  • Medical history (valuable for insurance fraud)

  • Prescription data (pharmaceutical fraud)

  • Financial information

  • Family history and contacts

In my fifteen years in cybersecurity, I've investigated breaches across every industry. Healthcare breaches are different. They're more damaging, more complex, and more personally devastating to victims.

I worked on a case in 2021 where a hospital breach exposed HIV-positive status for 12,000 patients. The financial damage was severe—$4.3 million in direct costs. But the human cost? Immeasurable. Patients faced discrimination, lost jobs, damaged relationships. Three lawsuits are still ongoing four years later.

"In healthcare, a data breach isn't just a security incident. It's a violation of trust at the most vulnerable moment in people's lives."

The HIPAA Gap: What Your Compliance Officer Isn't Telling You

Let me be controversial for a moment: HIPAA was groundbreaking when it passed in 1996, but it's showing its age.

Don't get me wrong—HIPAA compliance is mandatory, and for good reason. But here's what I've learned after helping healthcare organizations through both HIPAA and ISO 27001 implementations:

HIPAA vs ISO 27001: The Reality Check

Aspect

HIPAA Security Rule

ISO 27001

Why It Matters

Controls

18 addressable standards

93 detailed controls

ISO provides comprehensive coverage of modern threats

Risk Assessment

Required but methodology unspecified

Structured approach with regular reviews

ISO ensures consistent, repeatable risk management

Technology Focus

1990s technology baseline

Modern, evolving threats

ISO addresses cloud, mobile, AI, IoT security

Third-Party Management

Business Associate Agreements

Comprehensive vendor security assessment

ISO provides detailed vendor risk management

Continuous Improvement

No formal requirement

Built-in improvement cycle

ISO ensures your security evolves with threats

International Recognition

US-specific

Globally recognized standard

ISO opens doors to global partnerships

Audit Frequency

Periodic (often 3 years)

Annual surveillance audits

ISO ensures continuous compliance, not point-in-time

Incident Response

Breach notification focus

Comprehensive IR program

ISO prepares you to respond, not just report

I watched a regional hospital network achieve HIPAA compliance in 2019. They were proud—and rightfully so. But when we conducted an ISO 27001 gap analysis, we discovered:

  • 37 critical security gaps that HIPAA didn't address

  • No formal change management process for clinical systems

  • Inconsistent access controls across their 12 locations

  • No security monitoring for after-hours access

  • Incomplete asset inventory—they couldn't account for 23% of devices on their network

They'd checked every HIPAA box. But they weren't actually secure.

The Real-World Impact: A Case Study That Changed Everything

Let me share a story that illustrates why ISO 27001 matters in healthcare.

In 2020, I started working with a 200-bed community hospital. They'd been HIPAA compliant for years, but their new CEO—a former CIO who understood technology—wanted something more robust.

We implemented ISO 27001 over 14 months. The process was challenging, expensive ($280,000 total investment), and required significant organizational change.

Eight months after certification, they faced a targeted ransomware attack. The attackers had clearly done their homework, hitting them at 2 AM on a Friday night when staffing was minimal.

But here's what happened differently because of ISO 27001:

Minute 0: Automated monitoring (required by ISO control A.12.4.1) detected unusual file encryption patterns Minute 4: Security team was automatically alerted (ISO control A.16.1.5) Minute 8: Incident response team activated per documented procedures (ISO control A.16.1.1) Minute 15: Network segmentation (ISO control A.13.1.3) automatically isolated the affected systems Minute 30: Backups were verified and restoration began (ISO control A.12.3.1) Hour 4: Critical clinical systems were operational Hour 12: Full operations restored

Total downtime: 12 hours. Zero ransom paid. Zero patient data compromised. Zero regulatory penalties.

The hospital across town—with HIPAA compliance but no ISO certification—faced a similar attack six weeks later. They were down for 11 days. They paid $450,000 in ransom. They're still recovering patient trust two years later.

"ISO 27001 didn't prevent the attack. But it ensured we were prepared, protected, and able to respond effectively. That made all the difference." — Hospital CISO

The 93 Controls: How They Protect Healthcare

ISO 27001 includes 93 controls across 14 categories. Let me break down how the most critical ones apply specifically to healthcare:

Critical ISO 27001 Controls for Healthcare Organizations

ISO Control

Healthcare Application

Real-World Example

A.5.1 - Information Security Policy

Comprehensive security governance covering all medical data

Hospital implemented unified policy covering EHR, medical devices, telemedicine, and research data

A.8.1 - Asset Management

Complete inventory of all systems handling PHI

Clinic discovered 43 unapproved medical devices on their network during asset inventory

A.9.2 - Access Control

Role-based access to patient records

Reduced inappropriate medical record access by 87% through proper access controls

A.10.1 - Cryptography

Encryption of patient data at rest and in transit

Protected patient data during laptop theft—encrypted drives made data unusable

A.12.6 - Vulnerability Management

Regular scanning of clinical systems

Discovered critical vulnerabilities in infusion pumps before they could be exploited

A.13.1 - Network Security

Segmentation between clinical and administrative networks

Malware in billing system couldn't reach EHR due to network segmentation

A.14.2 - Secure Development

Security requirements for medical applications

Custom telehealth app built with security requirements from day one

A.15.1 - Supplier Security

Vendor risk assessment for all healthcare technology

Rejected EHR vendor with inadequate security, avoided potential breach

A.17.1 - Business Continuity

Disaster recovery for critical clinical systems

Restored operations within 4 hours after natural disaster

A.18.1 - Legal Compliance

Meeting HIPAA, state laws, and international requirements

Enabled international research collaboration with proper data protection

The Medical Device Challenge

Here's something that keeps healthcare CISOs awake at night: medical devices.

I worked with a cardiac care center that discovered they had 247 connected medical devices—infusion pumps, patient monitors, imaging equipment, ventilators. Of those:

  • 63% were running outdated operating systems

  • 41% had known critical vulnerabilities

  • 28% had default passwords that couldn't be changed

  • 19% had no security features whatsoever

HIPAA doesn't provide specific guidance for medical device security. ISO 27001 does.

Through ISO control implementation, we:

  1. Created a complete device inventory (ISO A.8.1)

  2. Implemented network segmentation to isolate vulnerable devices (ISO A.13.1)

  3. Established compensating controls for devices that couldn't be patched (ISO A.12.6)

  4. Set up monitoring for abnormal device behavior (ISO A.12.4)

  5. Developed procedures for secure device decommissioning (ISO A.8.3)

Six months later, when a vulnerability was discovered in their infusion pumps, they:

  • Identified all affected devices within 2 hours

  • Isolated them from the main network immediately

  • Applied compensating controls while waiting for patches

  • Maintained patient care without disruption

The Implementation Journey: What Nobody Tells You About ISO 27001 in Healthcare

I've guided 30+ healthcare organizations through ISO 27001 certification. Here's the reality:

Timeline and Resource Requirements

Implementation Phase

Duration

Key Activities

Healthcare-Specific Challenges

Planning & Gap Analysis

2-3 months

Assess current state, identify gaps, secure leadership buy-in

Getting physician buy-in, managing clinical workflow disruption

Risk Assessment

1-2 months

Identify assets, assess risks, determine treatment plans

Cataloging medical devices, assessing clinical system risks

Control Implementation

6-9 months

Deploy technical controls, create policies, train staff

Implementing without disrupting patient care, 24/7 operations

Documentation

Ongoing

Create required documents, maintain records

Balancing documentation with clinical demands

Internal Audit

1-2 months

Test controls, identify issues, remediate

Finding audit windows in 24/7 healthcare environment

Certification Audit

1-2 months

Stage 1 documentation review, Stage 2 on-site audit

Coordinating auditor access to clinical areas

Total Timeline

12-18 months

From kickoff to certification

Longer than other industries due to complexity

The Real Costs (From My Experience)

I always tell healthcare clients: budget for these ranges based on organization size:

Small Practice (1-3 locations, 50-150 employees)

  • Consultant fees: $40,000 - $80,000

  • Technology investments: $20,000 - $50,000

  • Internal staff time: 500-800 hours

  • Certification body: $15,000 - $25,000

  • Total: $75,000 - $155,000

Mid-Size Organization (4-10 locations, 150-1,000 employees)

  • Consultant fees: $80,000 - $180,000

  • Technology investments: $100,000 - $300,000

  • Internal staff time: 2,000-3,500 hours

  • Certification body: $25,000 - $50,000

  • Total: $205,000 - $530,000

Large Healthcare System (10+ locations, 1,000+ employees)

  • Consultant fees: $180,000 - $400,000

  • Technology investments: $300,000 - $1,000,000+

  • Internal staff time: 5,000-10,000 hours

  • Certification body: $50,000 - $100,000

  • Total: $530,000 - $1,500,000+

Expensive? Yes. But compare that to the average healthcare data breach cost of $10.93 million (the highest of any industry), and it's actually a bargain.

The Clinical Workflow Challenge: Making Security Work in Healthcare

Here's the hardest part of ISO 27001 in healthcare: balancing security with patient care.

I learned this lesson the hard way. In 2018, I worked with a hospital that implemented strict access controls. Every login required complex passwords that expired every 30 days. Multi-factor authentication was mandatory. Automatic logoff after 5 minutes of inactivity.

Perfect security, right?

Wrong.

Within a week:

  • ER physicians were writing passwords on their ID badges

  • Nurses were sharing login credentials to save time

  • Staff were disabling automatic logoff because they couldn't get to patients fast enough

  • One patient coded while a physician was locked out of the medication system

We'd made security so burdensome that healthcare workers were actively circumventing it—making the organization less secure than before.

"Security that interferes with saving lives isn't security. It's a liability."

We redesigned the approach:

Healthcare-Optimized Security Controls

Challenge

ISO 27001 Requirement

Healthcare-Friendly Solution

Result

Emergency access to patient records

Access controls (A.9.2)

Role-based access with emergency override and automatic logging

Physicians can access records in emergencies; security team reviews all override usage

Password complexity in fast-paced environment

Authentication (A.9.4)

Biometric authentication + proximity cards for clinical staff

Login time reduced from 45 seconds to 3 seconds

Shared workstations in nursing stations

User access management (A.9.2)

Automatic screen lock when staff move away (proximity sensing)

No manual logoff required; security maintained

Mobile device access for physicians

Mobile device policy (A.6.2)

Containerized medical apps with automatic data wiping

Physicians use personal devices securely

After-hours access for on-call staff

Time-based access controls (A.9.2)

Scheduled access expansion with alerting for unusual patterns

Legitimate access enabled; suspicious access detected

The key insight: ISO 27001 is flexible enough to accommodate healthcare workflows when you understand both the standard and the clinical environment.

The Top 10 ISO 27001 Controls That Prevent Healthcare Breaches

Based on my analysis of 50+ healthcare breaches, here are the controls that would have prevented or mitigated most incidents:

1. A.9.2.1 - User Registration and Deregistration

The Problem: A hospital discovered that 23% of active accounts belonged to former employees. One terminated IT administrator accessed patient records for 6 months after leaving.

The Solution: Automated deprovisioning integrated with HR systems. When someone leaves, access is removed within 1 hour.

Impact: Eliminated inappropriate access by former employees entirely.

2. A.12.4.1 - Event Logging

The Problem: A breach went undetected for 14 months because the organization had no centralized logging.

The Solution: Comprehensive SIEM system logging all access to PHI, with automated alerting for suspicious patterns.

Impact: Current average detection time: 3.2 hours (industry average: 277 days).

3. A.13.1.3 - Segregation in Networks

The Problem: Ransomware spread from a billing system to the EHR because everything was on the same network.

The Solution: Clinical systems isolated from administrative systems. Critical systems on separate VLANs.

Impact: When ransomware hit the billing system, clinical operations continued unaffected.

4. A.15.1.1 - Information Security Policy for Supplier Relationships

The Problem: A vendor's compromised system was used to access the hospital's patient database.

The Solution: All vendors undergo security assessment. High-risk vendors receive annual audits. Vendor access is monitored and time-limited.

Impact: Caught vendor compromise within 20 minutes; prevented data access.

5. A.12.3.1 - Information Backup

The Problem: Ransomware encrypted patient records. Backups were connected to the network and also encrypted.

The Solution: Air-gapped backups. Regular restore testing. Immutable backup storage.

Impact: Full restoration within 6 hours during ransomware attack; zero data loss.

6. A.12.6.1 - Management of Technical Vulnerabilities

The Problem: Attackers exploited a 2-year-old unpatched vulnerability in the EHR system.

The Solution: Monthly vulnerability scanning. Prioritized patching based on risk. Virtual patching for systems that can't be taken offline.

Impact: Critical vulnerabilities patched within 48 hours; compensating controls for others.

7. A.9.4.1 - Information Access Restriction

The Problem: All physicians could access all patient records, leading to 47 privacy violations in one year.

The Solution: Role-based access control. Physicians can only access their own patients' records (with emergency override).

Impact: Privacy violations dropped 94%.

8. A.16.1.1 - Responsibilities and Procedures

The Problem: During a breach, nobody knew who was responsible for what. Response took 8 hours to coordinate.

The Solution: Documented incident response plan. Regular tabletop exercises. Clear escalation procedures.

Impact: Coordinated response within 15 minutes during next incident.

9. A.18.1.5 - Regulation of Cryptographic Controls

The Problem: Unencrypted laptop stolen from physician's car contained 2,400 patient records. Required breach notification.

The Solution: Full disk encryption mandatory on all devices. Remote wipe capability. Cannot access network without encryption.

Impact: Next laptop theft (yes, it happened again) required no breach notification because data was encrypted.

10. A.14.2.1 - Secure Development Policy

The Problem: Custom patient portal had SQL injection vulnerability. Exposed 50,000 patient records.

The Solution: Security requirements in development lifecycle. Code review. Penetration testing before deployment.

Impact: Seven vulnerabilities caught before production; zero successful exploits in 3 years.

The Hidden Benefits: What Happens After Certification

Here's what surprised me most about ISO 27001 in healthcare—the benefits that have nothing to do with security:

1. Research Collaboration Opportunities

A cancer research center I worked with achieved ISO 27001 certification. Within six months, they were invited to join an international research consortium that required certified data protection.

The research collaboration brought:

  • $3.2 million in additional grant funding

  • Access to patient data from 40 countries

  • Co-authorship on 12 high-impact publications

  • Recruitment of top researchers attracted by robust data protection

The CISO told me: "We pursued ISO 27001 for security. We ended up transforming our research capabilities."

2. Insurance Premium Reduction

Healthcare cyber insurance has become brutally expensive. I've seen premiums increase 400% in some cases.

But organizations with ISO 27001 certification consistently see better rates:

Organization Type

Without ISO 27001

With ISO 27001

Annual Savings

Small clinic (50 employees)

$45,000/year

$28,000/year

$17,000

Mid-size hospital (500 employees)

$380,000/year

$210,000/year

$170,000

Large health system (3,000 employees)

$2.1M/year

$1.1M/year

$1,000,000

One hospital CFO calculated that their insurance savings would pay for their ISO 27001 implementation in just under 3 years.

3. Operational Efficiency

This sounds counterintuitive, but ISO 27001 often improves operational efficiency in healthcare.

A clinic I worked with discovered during their implementation:

  • They had 7 different systems doing patient scheduling

  • 40% of their software licenses were unused

  • Their change management process was causing 20 hours of preventable downtime monthly

  • They were paying for 3 separate backup solutions when one would suffice

ISO 27001 forced them to document and rationalize their environment. Results:

  • Software costs reduced by $120,000 annually

  • System downtime reduced by 73%

  • IT team productivity increased (fewer fires to fight)

  • Faster deployment of new services

4. Competitive Advantage

More healthcare organizations are requiring ISO 27001 from partners and vendors.

I watched a telehealth startup win a $4.8 million contract with a major hospital system specifically because they had ISO 27001 certification. Their competitor had better features and lower pricing but couldn't demonstrate adequate data protection.

The hospital's procurement director was blunt: "After our breach last year, we can't justify partnering with anyone who isn't certified. Our board won't allow it."

Common Implementation Mistakes (And How to Avoid Them)

After guiding 30+ healthcare organizations through ISO 27001, I've seen the same mistakes repeatedly:

Mistake #1: Treating It as an IT Project

What Happened: A hospital assigned ISO 27001 to their IT department. Clinical staff weren't involved until the certification audit.

The Result: Policies that looked good on paper but were completely impractical in clinical settings. Failed the first audit.

The Fix: ISO 27001 is an organizational project. Include representatives from:

  • Clinical operations

  • Nursing

  • Pharmacy

  • Medical records

  • Human resources

  • Legal/compliance

  • Executive leadership

Mistake #2: Documentation Overkill

What Happened: A clinic created 340 pages of policies and procedures that nobody read and couldn't follow.

The Result: Staff ignored the documentation. Auditor found multiple control failures.

The Fix: Keep documentation concise and practical. My rule of thumb:

  • Policies: 2-3 pages per policy

  • Procedures: Step-by-step, with screenshots

  • Work instructions: One page, focused on specific tasks

Mistake #3: Buying Technology Without Strategy

What Happened: A hospital spent $400,000 on security tools before doing their risk assessment.

The Result: Half the tools addressed low-priority risks. Critical gaps remained.

The Fix: Always start with risk assessment. Let risk drive your control selection and technology purchases.

Mistake #4: Ignoring Medical Devices

What Happened: An organization scoped their ISO 27001 implementation to "IT systems," excluding medical devices.

The Result: Auditor identified this as a scope gap. Medical devices were handling patient data and needed to be included.

The Fix: Include all systems that create, process, or store patient data—including medical devices, even if you can't modify their security settings.

Mistake #5: One-and-Done Mentality

What Happened: An organization pushed hard to get certified, then treated it as "complete."

The Result: Failed their first surveillance audit 14 months later. Lost certification.

The Fix: ISO 27001 requires continuous improvement. Schedule quarterly reviews. Update risk assessments annually. Maintain documentation throughout the year.

Building the Business Case: Convincing Your Board

I've presented to dozens of healthcare boards about ISO 27001. Here's the argument that works:

The ROI Presentation Framework

Slide 1: The Risk "Healthcare data breaches cost an average of $10.93 million. We handle records for [X] patients. A breach would cost us approximately [calculation] in direct costs, plus incalculable reputational damage."

Slide 2: The Compliance Gap "We're HIPAA compliant, but HIPAA leaves [X] critical security gaps. ISO 27001 addresses modern threats that HIPAA doesn't cover."

Slide 3: The Investment "Implementation will cost approximately [amount] over [timeline]. Annual maintenance will cost [amount]."

Slide 4: The Return

  • Reduced breach risk: [Calculate expected loss reduction]

  • Lower insurance premiums: [Show actual quotes]

  • New partnership opportunities: [List specific opportunities]

  • Competitive advantage: [Show market trends]

  • Operational improvements: [Estimate efficiency gains]

Slide 5: The Timeline "We can achieve certification in [timeline] with minimal disruption to clinical operations."

Slide 6: The Alternative "If we don't invest in comprehensive security:

  • We face [X]% annual breach probability

  • We may lose partnerships requiring certification

  • We'll pay higher insurance premiums indefinitely

  • We're vulnerable to threats that HIPAA doesn't address"

One CFO told me after this presentation: "You convinced me that we can't afford NOT to do this."

Your Implementation Roadmap

Based on my experience, here's the practical path to ISO 27001 certification in healthcare:

Months 1-2: Foundation

  • Secure executive sponsorship and budget

  • Assemble cross-functional implementation team

  • Engage consultant and certification body

  • Conduct gap analysis

  • Define scope (include all systems handling patient data)

Months 3-4: Risk Assessment

  • Create complete asset inventory (including medical devices)

  • Identify threats and vulnerabilities

  • Assess current controls

  • Determine risk treatment plans

  • Get leadership approval on risk acceptance

Months 5-10: Control Implementation

  • Deploy technical controls (encryption, access controls, monitoring)

  • Create policies and procedures

  • Implement physical security measures

  • Train all staff on security awareness

  • Train specific roles on their security responsibilities

Months 11-12: Documentation and Testing

  • Complete required documentation

  • Conduct internal audits

  • Test incident response procedures

  • Perform tabletop exercises

  • Address any identified gaps

Months 13-14: Certification Audit

  • Stage 1 audit (documentation review)

  • Address any findings

  • Stage 2 audit (on-site assessment)

  • Remediate any non-conformities

Month 15+: Maintenance

  • Quarterly internal reviews

  • Annual risk assessment updates

  • Annual surveillance audits

  • Continuous improvement initiatives

Final Thoughts: The Future of Healthcare Security

After fifteen years in this field, I'm more convinced than ever that comprehensive frameworks like ISO 27001 are essential for healthcare.

The threat landscape is evolving:

  • AI-powered attacks that adapt in real-time

  • Supply chain compromises through medical device manufacturers

  • Ransomware specifically targeting healthcare

  • Nation-state actors interested in health data

  • Insider threats from stressed, overworked staff

HIPAA provides a baseline. ISO 27001 provides a defense.

I think about that emergency room physician from the beginning of this article. Six months after their downtime incident, they completed ISO 27001 certification. They've since faced two ransomware attempts, one insider threat, and a vendor compromise.

All were detected and neutralized before causing damage.

She told me recently: "ISO 27001 didn't just protect our data. It protected our ability to care for patients. That's what matters most."

"In healthcare, security isn't about protecting bits and bytes. It's about protecting human beings at their most vulnerable. ISO 27001 gives us the framework to do that effectively."

The question isn't whether you can afford to implement ISO 27001. It's whether you can afford not to.

Your patients trust you with their health and their data. ISO 27001 helps you honor that trust.


Ready to start your ISO 27001 journey? At PentesterWorld, we provide detailed implementation guides, templates, and expert insights specifically for healthcare organizations. Subscribe to our newsletter for practical, actionable guidance from security professionals who've been in the trenches.

84

RELATED ARTICLES

COMMENTS (0)

No comments yet. Be the first to share your thoughts!

SYSTEM/FOOTER
OKSEC100%

TOP HACKER

1,247

CERTIFICATIONS

2,156

ACTIVE LABS

8,392

SUCCESS RATE

96.8%

PENTESTERWORLD

ELITE HACKER PLAYGROUND

Your ultimate destination for mastering the art of ethical hacking. Join the elite community of penetration testers and security researchers.

SYSTEM STATUS

CPU:42%
MEMORY:67%
USERS:2,156
THREATS:3
UPTIME:99.97%

CONTACT

EMAIL: [email protected]

SUPPORT: [email protected]

RESPONSE: < 24 HOURS

GLOBAL STATISTICS

127

COUNTRIES

15

LANGUAGES

12,392

LABS COMPLETED

15,847

TOTAL USERS

3,156

CERTIFICATIONS

96.8%

SUCCESS RATE

SECURITY FEATURES

SSL/TLS ENCRYPTION (256-BIT)
TWO-FACTOR AUTHENTICATION
DDoS PROTECTION & MITIGATION
SOC 2 TYPE II CERTIFIED

LEARNING PATHS

WEB APPLICATION SECURITYINTERMEDIATE
NETWORK PENETRATION TESTINGADVANCED
MOBILE SECURITY TESTINGINTERMEDIATE
CLOUD SECURITY ASSESSMENTADVANCED

CERTIFICATIONS

COMPTIA SECURITY+
CEH (CERTIFIED ETHICAL HACKER)
OSCP (OFFENSIVE SECURITY)
CISSP (ISC²)
SSL SECUREDPRIVACY PROTECTED24/7 MONITORING

© 2026 PENTESTERWORLD. ALL RIGHTS RESERVED.